Start Date
16-8-2018 12:00 AM
Description
As phishing emails represent continuous attack vectors, users’ continuance in anti-phishing behavior is highly significant. This paper extends the previous literature on phishing and information security. We develop a hierarchical inter-looped cybernetic model that integrates protection motivation theory, expanded prominence interpretation theory, and risk analysis. Our model explores the (1) continuous interdependence of avoidance and adoption cognitive systems in anti-phishing behavior, and (2) continuous interdependence of education, awareness and training. The conceptual foundation, derived propositions and contributions are discussed.
Recommended Citation
Nehme, Alaa and George, Joey F., "Iterating the Cybernetic Loops in Anti-Phishing Behavior: A Theoretical Integration" (2018). AMCIS 2018 Proceedings. 28.
https://aisel.aisnet.org/amcis2018/Security/Presentations/28
Iterating the Cybernetic Loops in Anti-Phishing Behavior: A Theoretical Integration
As phishing emails represent continuous attack vectors, users’ continuance in anti-phishing behavior is highly significant. This paper extends the previous literature on phishing and information security. We develop a hierarchical inter-looped cybernetic model that integrates protection motivation theory, expanded prominence interpretation theory, and risk analysis. Our model explores the (1) continuous interdependence of avoidance and adoption cognitive systems in anti-phishing behavior, and (2) continuous interdependence of education, awareness and training. The conceptual foundation, derived propositions and contributions are discussed.